heroui logo

Suspicious Java Children Processes

Sigma Rules

View Source
Summary
This detection rule is designed to identify potentially malicious behavior on Linux systems when a Java process spawns child processes that are associated with command-line interpreters or utilities known to be used in script execution. Specifically, it looks for any Java process (where the parent image ends with '/java') that creates child processes using command-line arguments that contain shell interpreters like '/bin/sh', 'bash', or other interpreters, as well as utilities like 'curl', 'wget', and even 'python'. The focus is on detecting unexpected interactions originating from Java processes, as they may indicate an attack vector where an adversary is leveraging Java-based applications to execute scripts or download malicious content.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2022-06-03